Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWhqMmotNzd4bS1tYzV2
Jinja2 sandbox escape vulnerability
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.
Permalink: https://github.com/advisories/GHSA-hj2j-77xm-mc5vJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWhqMmotNzd4bS1tYzV2
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 5 years ago
Updated: 2 months ago
CVSS Score: 8.6
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
EPSS Percentage: 0.00434
EPSS Percentile: 0.74919
Identifiers: GHSA-hj2j-77xm-mc5v, CVE-2016-10745
References:
- https://nvd.nist.gov/vuln/detail/CVE-2016-10745
- https://github.com/pallets/jinja/commit/9b53045c34e61013dc8f09b7e52a555fa16bed16
- https://access.redhat.com/errata/RHSA-2019:1022
- https://access.redhat.com/errata/RHSA-2019:1237
- https://access.redhat.com/errata/RHSA-2019:1260
- https://access.redhat.com/errata/RHSA-2019:3964
- https://access.redhat.com/errata/RHSA-2019:4062
- https://github.com/advisories/GHSA-hj2j-77xm-mc5v
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html
- https://github.com/pypa/advisory-database/tree/main/vulns/jinja2/PYSEC-2019-220.yaml
- https://palletsprojects.com/blog/jinja-281-released
- https://usn.ubuntu.com/4011-1
- https://usn.ubuntu.com/4011-2
Blast Radius: 44.1
Affected Packages
pypi:Jinja2
Dependent packages: 4,068Dependent repositories: 133,056
Downloads: 229,886,080 last month
Affected Version Ranges: < 2.8.1
Fixed in: 2.8.1
All affected versions: 2.1.1, 2.2.1, 2.3.1, 2.4.1, 2.5.1, 2.5.2, 2.5.3, 2.5.4, 2.5.5, 2.7.1, 2.7.2, 2.7.3
All unaffected versions: 2.8.1, 2.9.1, 2.9.2, 2.9.3, 2.9.4, 2.9.5, 2.9.6, 2.10.1, 2.10.2, 2.10.3, 2.11.0, 2.11.1, 2.11.2, 2.11.3, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.1.0, 3.1.1, 3.1.2, 3.1.3, 3.1.4